M365 License Assignment Report
Table of ContentsIntroductionRequirementsFeaturesHow does it work? Interactive AuthenticationClient Secret AuthenticationCertificate AuthenticationAccess Token AuthenticationManaged Identity AuthenticationEmail FunctionalityConclusion Introduction Every administrator knows the problem of licenses and their allocation. This is often a drama to get a good overview and to review this periodically. I have run into this problem several times and often you…
Entra ID Admin Roles Report
Table of ContentsIntroductionRequirementsFeaturesHow does it work? Interactive AuthenticationClient Secret AuthenticationCertificate AuthenticationAccess Token AuthenticationManaged Identity AuthenticationEmail FunctionalityConclusion Introduction Every administrator knows the problem of managing roles and permissions. It’s often a struggle to get a good overview of who has access to what, and reviewing this periodically can be a real headache. I’ve encountered…
🚀Introducing ASR Rule Inspector V2
Table of ContentsIntroductionWhat’s New in the V2? Intune vs Local Comparison – No More Policy GuessworkDetecting Duplicate and Conflicting RulesSee What’s Really in Those Exclusion FoldersHTML reportUse CasesVerify Policy AssignmentsAnalyze ASR RulesAudit ASR ExclusionsCFA Compliance ChecksIntune Debug ToolkitConclusion Introduction After some incredibly valuable feedback and a few feature requests, I’m excited to share…
ASR Rules: The Importance of Configuration and Verifying with the “ASR Rule Inspector”
Introduction In today’s evolving threat landscape, cybercriminals continuously exploit vulnerabilities in systems and applications. Attack Surface Reduction (ASR) rules help mitigate these risks by limiting the ways malware and threat actors can infiltrate an organization. By enforcing strict policies on script execution, Office macros, and other attack vectors, ASR rules reduce exposure to…
Language Packs? I Just Told My Computer to ‘Figure It Out.’ Apparently, It Did.
Do you know that moment? You’ve got your Intune environment perfectly set up, Autopilot profiles configured, and you think, ‘Yes, worldwide rollout, no problem!’ But then… reality hits. Devices start up in a different language than expected, and users ask you why their keyboard suddenly types hieroglyphs. Yeah, that. Apparently, the device was…
About me 👋
I’m Roy Klooster, and I’m obsessed with all things about modern workplace. But not just the basics – I’m talking about getting down into the nitty-gritty, pushing the boundaries, and making tech work for you.
My playground?
- Microsoft Intune: Wrangling devices and keeping them secure is my jam.
- Automation & Remediation: If it can be automated, I’ll automate it. If it’s broken, I’ll fix it (automatically, of course). 🤖
- Advanced Monitoring: Keeping a watchful eye on everything, so you don’t have to. 📈
Think of this blog as your go-to resource for practical tips, in-depth tutorials, and real-world insights. We’ll explore how to leverage these powerful tools to optimize your M365 environment, boost productivity, and keep your data safe.
Let’s dive in and unlock the full potential of M365 together! 💻✨